Applied Mechanics and Materials Vols. 347-350

Paper Title Page

Abstract: this paper analyzes the problems of heterogeneous databases in a distance education system. It provides a heterogeneous database integration model based on XML and design and develop a heterogeneous database integration platform based on this model. Thus, it provides a unified standard and effective tool for teaching resource description and management in distance education.
2483
Abstract: Virtual machine security issues have been the focus of attention. The permissions of traditional administrative domain Dom0 are too large, so that the user's privacy is threatened. Once the attacker compromises Dom0, it can threaten the entire virtualization platform. This paper introduces a privilege separation virtual machine security model (PSVM). Dom0s privileges are split into two parts: the operations about the user's privacy form a DomU management domain, responsible for managing the user's privacy; remaining forms Thin Dom0. Users and virtualization platform for server-side need mutual authentication. It can prevent unauthorized users and counterfeiting Virtualization platform invading system. The user's privacy is under its own management to prevent the Virtualization platform snooping. However, it affects only one user, even if the management domain is compromised. Combined with the model, the prototype system is implemented and security analysis and performance testing is done.
2488
Abstract: Understanding and modeling the structure of a complex network can lead to a better knowledge of its evolutionary mechanisms, and to a better cottoning on its dynamic and functional behavior. The nodes within a network not only tend to connect the nodes with high degree (scale-free property), and tend to connect with their relatively close distance nodes (community structure property), and the high-degree nodes are easier to connect with their relatively far nodes comparing with the low-degree nodes in the process of network evolution. This phenomenon has been commonly observed from many real-world networks, ranging from social to biological even to technical networks. To model this kind of networks, the present letter proposes a scale free network model with community structure (SFC) to capture and describe their essential topological properties. Numerical simulations indicate that the generated network based on SFC model has scale-free and community structure property. Under the control of the parameters of the model, the community structure of network can be adjustable.
2495
Abstract: Passenger and freight train scheduling problem on double-track railway line is considered by using Ant Colony Optimization (ACO) algorithm. The aim is to reasonably arrange the dispatch sequence of the trains to minimize the total run time. The constrains in train scheduling problem are considered and the model is established. Due to the complexity of train scheduling problem, this problem is solved by ACO and implemented by programming. A case study is presented to illustrate the solution. The results illustrate that the proposed method is effective to solve the scheduling problem on double-track railway line.
2501
Abstract: With the development of Internet, Network public opinion has been serving an import role in reflection of social public opinion. As there are a large number of websites and forums on the Internet, we need a powerful crawler system which can meet the demands of opinion mining. However, common crawler systems concern more about ranking and recommendation algorithms, which is less important in opinion mining. In this article, we introduced the design and implementation of a distributed crawler system for opinion mining. We also introduced some extra parameters such as keywords count and published time into the ranking and refreshing strategies. Experimental results demonstrate that the system can well support different sites, and the improved strategies can greatly enhance the crawling and monitoring efficiency.
2506
Abstract: The Internet of things is the key strategic application in the twelfth Five-Year plan of emerging technology industries in China. This paper introduces the basic concepts of Internet of things, proposes a three-layer model development platform based on the International Telecommunication Union (ITU) specification, and describes the key technology and architecture in the platform, and gives smart home application development based on the platform.
2511
Abstract: Over the last decade, functional magnetic resonance imaging (fMRI) has become a primary tool to predict the brain activity.During the past research, researchers transfer the focus from the picture to the word.The results of these researches are relatively successful. In this paper, several typical methods which are machine learning methods are introduced. And most of the methods are by using fMRI data associated with words features. The semantic features (properties or factors) support words neural representation, and have a certain commonality in the people.The purpose of the application of these methods is used for prediction or classification.
2516
Abstract: Many optimizations have been done to 3DR-tree index structure and many opinions have been proposed. Modification by splitting mechanism is one of them. There are two index trees in 3DR-tree index structure after modification: one is a history tree for past data storage and the other is an active tree for current data storage. In this article, optimization of history tree is firstly done and is proved theoretically. Then a correspondent insert algorithm is designed.
2521
Abstract: The paper researches the parametric inversion of the two-dimensional ellipse equation by means of non-linear optimization method, draw a Numerical Solution for such inverse problem. It is shown by numerical simulations that the method is feasible and effective.
2524
Abstract: Based on analyzing and experimenting a large number of the existing fingerprint image preprocessing algorithm, this paper presents a novel high-quality fingerprint image preprocessing algorithm. Taking full account of the inherent characteristics of the fingerprint image, the algorithm arranges overall features and local detail. The experiments show that it is a simple, efficient algorithm which can improve the quality of the fingerprint image, and lay a good foundation for the subsequent processing.
2528

Showing 501 to 510 of 805 Paper Titles